Penetration Studies - A Technical Overview

This paper builds on Jessica Lowery's research paper, Penetration Testing: The Third Party Hacker, by drilling down on some of the most common tools and applications used to perform penetration tests. Penetration tests can be performed externally and/or internally. This paper takes the position of...
Timothy Layton
May 30, 2002

All papers are copyrighted. No re-posting of papers is permitted